Last year, ASIS International released the Enterprise Security Risk Management (ESRM) Guideline, which takes a different approach to traditional security. The ESRM Guideline was released at the 2019 Global Security Exchange (GSX) in September, and the Maturity Model is now available on the ASIS website.
According to Verizon's 2019 Mobile Security Index report, two-thirds of organizations said they are less confident about the security of their mobile assets than other devices. Many of these breaches occur due to vulnerable devices, servers and applications that allow bad actors to gain access. Security breaches and the threat of compromise are a serious issue for organizations of all sizes.
In the event that a ransomware attack is successful, what questions should your organization ask? How can your organization mitigate short and long-term damage, as well?
Risk remains the top concern for organizations adopting software-as-a-service (SaaS) models and this is an issue that is only getting worse. What is needed today is the ability to remove the dependency on human behavior and human error, bringing control back to the security team.
Even if a Chief Information Security Officer (CISO) performs 99 percent of their tasks perfectly, there is still plenty of opportunity to make mistakes. When companies have unpatched vulnerabilities, or incorrect configurations, or other holes in their security tactics (not to mention the "set it and forget it” mentality after deployment)—security management can quickly become a CISO’s nightmare. This is why it's so important for leaders to consider the following when developing the right security approach for their organizations.
As coronavirus cases continue to emerge in cities across the country, it’s the responsibility of local officials to continuously address the evolving situation with the public. When communicating with the public about pressing emergencies, such as the coronavirus, here’s what public safety officials need to accomplish with their messaging.
You are a new Chief Information Security Officer (CISO) in the financial services industry. You are excited about the job but anxious due to the scale of the cyber threat from a range of actors: lone-wolf hackers, organized crime syndicates, governments and their proxies, and insiders. As you think through your game plan for addressing these threats, what’s your most important first step?
To minimize the occurrence of physical and digital harm in the workplace, 90 percent of organizations are training employees on safety procedures, including compliance training and programs on other topics.
Facial recognition systems are an excellent way to improve security and enable touchless access control in buildings and facilities in this new world of social distancing. As experts increasingly recommend face masks to limit the spread of COVID-19, it’s natural to question how this might effect the performance of facial recognition algorithms.